Seoul cyber investigators seize data, devices from ‘South Korea’s Amazon’ following data breach

South Korean police on Tuesday raided the headquarters of the country’s largest online retailer as part of an investigation into the business’ recently disclosed data breach.

Coupang, often described as the country’s version of Amazon, apologized earlier this month after confirming that the personal details of 33.7 million customer accounts had been compromised.

Cyber investigators from the Seoul Metropolitan Police Agency have now seized devices and data from the company’s headquarters in order to find evidence uncovering how the breach took place.

The police previously announced that they believed they had identified the perpetrator, described as a Chinese former employee who has since left the country, based on data voluntarily provided by Coupang.

During a parliamentary hearing last week, Coupang’s chief information security officer said the company believed the person responsible for the breach had occupied “a privileged role within the organization” and obtained a private encryption key they used to forge a token impersonating a Coupang customer, as reported by Reuters.

A police official said the newly secured digital evidence will allow investigators to “comprehensively determine the overall facts of the case, such as the leaker of the personal information as well as the route and cause of the leak,” reported Yonhap News Agency.

The raid follows political criticisms of South Korea’s data protection rules and comes in the wake of several high-profile data breaches affecting the country’s companies.

Coupang’s incident affecting 33.7 million people is one of the largest the country has ever grappled with.

Senior executives at Coupang, which is listed on the New York Stock Exchange, have also provoked investor concern after it emerged they sold shares in the company in an officially preplanned sale that completed days before the business formally disclosed the breach.

Additional scrutiny is also being applied to establish if liability clauses in Coupang’s terms of service legitimately insulate the company from any fallout over the incident, while South Korea’s trade regulator is questioning whether Coupang is using “dark patterns” to prevent customers deleting their accounts.

The data breach has become a major discussion point in South Korean politics, with President Lee Jae Myung calling for tougher penalties in corporate negligence cases when personal data was insufficiently protected. The current penalties are capped at 3% of a company’s annual global turnover.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

Next Post

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Related Posts

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42. "Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is
Read More

Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware attacks likely orchestrated by Storm-2603 (aka CL-CRI-1040 or Gold Salem), which is known for deploying the Warlock and LockBit ransomware. The threat actor's use of the security utility was documented by Sophos last month. It's assessed that the attackers
Read More